kubernetes-sigs/aws-iam-authenticator

[Bug]:

BenHorneIL opened this issue · 0 comments

What happened?

We are migrating our access controls to AWS SSO. We have been using gimme-aws-creds to access the cluster and get credentials and that is working fine. When we run aws configure sso we are able to assume a role and see the resources in AWS. We have configured aws-iam-authenticator role mapping and identity Mappings in the cluster and we know they work with gimme-aws-creds.

With the switch to AWS SSO, aws-iam-authenticator does not show a way to use sso creds for authentication.

What you expected to happen?

aws-iam-authenticator should expose a way to use sso credentials that have been generated and not only use the .aws/credentials file as AWS SSO does not write those creds to that file.

Anything else we need to know?

This is a KOPS cluster that currently works when not using AWS SSO.

Our configmap as entries similar to:

  • roleARN: arn:aws:sts:::assumed-role/assumed_role
    username: admin:{{SessionName}}
    groups:
    - system:masters

Currently running 0.5.12 on the kops daemon sets as that is the latest version there.

Installation tooling

homebrew

AWS IAM Authenticator client version

0.6.11

Client information

- OS/arch: Mac/arm64 13.4.1
- kubernetes client & version: client: 1.27.2, server 1.26.7

Kubernetes API Version

1.26.7

kubeconfig user

- name: user-sso
  user:
    exec:
      apiVersion: client.authentication.k8s.io/v1beta1
      args:
      - token
      - -i
      - cluster
      command: aws-iam-authenticator
      env: null
      interactiveMode: IfAvailable
      provideClusterInfo: false